Skip to content

Commit e27aa79

Browse files
committed
update
1 parent b2365d4 commit e27aa79

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/saas-apps/aws-multi-accounts-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -124,9 +124,9 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
124124

125125
| Name | Source Attribute | Namespace |
126126
| --------------- | --------------- | --------------- |
127-
| RoleSessionName | user.userprincipalname | https://aws.amazon.com/SAML/Attributes |
128-
| Role | user.assignedroles | https://aws.amazon.com/SAML/Attributes |
129-
| SessionDuration | "provide a value between 900 seconds (15 minutes) to 43200 seconds (12 hours)" | https://aws.amazon.com/SAML/Attributes |
127+
| RoleSessionName | user.userprincipalname | `https://aws.amazon.com/SAML/Attributes` |
128+
| Role | user.assignedroles | `https://aws.amazon.com/SAML/Attributes`|
129+
| SessionDuration | "provide a value between 900 seconds (15 minutes) to 43200 seconds (12 hours)" | `https://aws.amazon.com/SAML/Attributes` |
130130

131131
a. Click **Add new claim** to open the **Manage user claims** dialog.
132132

@@ -233,7 +233,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
233233

234234
1. Now sign into [Azure portal](https://portal.azure.com/) and navigate to **Groups**.
235235

236-
1. Create new groups with the same name as that of IAM Roles created earlier and note down the **Object Ids** of these new groups.
236+
1. Create new groups with the same name as that of IAM Roles created earlier and note down the **Object IDs** of these new groups.
237237

238238
![Select Administrator Access](./media/aws-multi-accounts-tutorial/copy-objectids.png)
239239

@@ -274,7 +274,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
274274

275275
![Microsoft Graph Explorer dialog box](./media/aws-multi-accounts-tutorial/graph-explorer-new1.png)
276276

277-
f. From the list of Service Principals fetched, get the one you need to modify. You can also use the Ctrl+F to search the application from all the listed ServicePrincipals. You can use following query by using the **Object id** which you have copied from Azure AD Properties page to get to the respective Service Principal.
277+
f. From the list of Service Principals fetched, get the one you need to modify. You can also use the Ctrl+F to search the application from all the listed ServicePrincipals. You can use following query by using the **Object ID** which you have copied from Azure AD Properties page to get to the respective Service Principal.
278278

279279
`https://graph.microsoft.com/beta/servicePrincipals/<objectID>`.
280280

0 commit comments

Comments
 (0)